Business World

How cyber-smart is your organizati­on?

- TRACEY MALCOLM OPINION

Irecently participat­ed in a panel discussion about the current state of affairs in public-private informatio­n sharing, the Internet of Things, and whether data privacy is dead. For the risk managers and chief informatio­n security officers (CISO) attending, there was considerab­le discussion about the need to share informatio­n across organizati­ons and with the federal government to better understand, mitigate and prevent cyber security threats. This is a new and necessary way of thinking, recognizin­g that “together we are stronger.” This also applies to the workforce within organizati­ons.

Willis Towers Watson recently analyzed and published employee survey results across its database, capturing employee opinions from over 450,000 employees correspond­ing to a period during which significan­t data breaches were identified within the companies. We wanted to understand if there were vulnerable aspects of culture in databreach­ed companies, and compared these opinion scores with global high–performanc­e organizati­ons with the highest levels of favorable opinion in the database

In comparison with high- performanc­e companies, employees’ opinions in databreach­ed organizati­ons consistent­ly lag when queried about training. These entities may not place the same emphasis on training needed for their employees’ work. When we consider the increasing, ever-evolving use of technology in work, coupled with a lack of training and talent shortage for work with technology, there is a risk of not having the necessary “Cyber IQ” to safeguard informatio­n and handle data appropriat­ely.

ARE YOU CYBER WORK READY?

To create a cyber-smart organizati­on, a learning culture that emphasizes applying acquired skills to business challenges is needed. Breached companies’ inability to create an ongoing learning environmen­t may reflect a lack of emphasis on staying current with emerging business needs and trends. This potentiall­y includes knowledge of how to circumvent attempts to acquire confidenti­al and sensitive data by determined hackers. A closer look by IT workers at the gaps in breached organizati­ons reveals a common theme related to training: inadequate onboarding. For IT staff, onboarding needs to cover the processes and procedures to manage cyber risk given the business environmen­t.

With over 80% of cyber functions anticipati­ng headcount growth and changes to their cyber and IT organizati­on structures, boards, management, CISOs and chief human resources officers are requiring work strategies to define the changing scope and impact of cyber work, and identify emerging skills and talent gaps. Learning and improved collaborat­ion across cyber defense and IT teams is one important step to be cyber work ready. Another key action is to recognize where talent gaps exist due to skill deficits in the market and the extended time to onboard and reach productivi­ty in role. Future digital workers will need to possess technical skills that both advance companies today and are flexible enough to be adapted as the digital environmen­t evolves.

Consider key areas of work that are increasing­ly important and in high demand with limited talent supply: Architectu­re and engineerin­g (the design of how technology systems and platforms relate), business acumen (effectivel­y partnering with the business for product/service and cyber security integrity), and threat intelligen­ce research (data insights and hypothesis testing). CISOs and business leaders highlight that they need new talent in these areas, and the time to hire and onboard talent has grown in some cases it can take 12-18 months by the time “productive talent” is in role. Can you afford to have these talent gaps for that long? CISOs, cyber and IT leaders, and HR need to actively manage this deficit and risk by evaluating alternativ­es to get the work done.

These alternativ­es may include reconfigur­ing work and securing talent in hybrid roles that pair IT/cyber/ business product, or breaking apart the jobs to look at different resources, such as specialist talent with third- party providers or contracted subject matter experts, or technology itself ( artificial intelligen­ce). As talent deficits are addressed, bear in mind the research: whether permanent or an alternativ­e worker type, your organizati­on’s specific on- boarding and training programs are an important line of defense in addressing cyber vulnerabil­ities and achieving resiliency.

Newspapers in English

Newspapers from Philippines